Академический Документы
Профессиональный Документы
Культура Документы
Networking
Assignment 2
Prepared for :
Prepared by:
Le Vo Thang
2
QUALIFICATION
CREDIT VALUE 15
GRADING GRID
Learners declaration
I certify that the work submitted for this assignment is my own and research sources are fully
acknowledged.
Student signature: Thang Date: 25/9/2018
4
ASSESMENT CRITERIA
Criteria Reference
LO 1
LO 2
LO 3
5
LO 4
Assignment Feedback
Action Plan
Summative feedback
Assessor Date
Signature
Table of Contents
Task 1 ......................................................................................................................................................... 8
P1.1 .......................................................................................................................................................... 8
A) Evaluate current name resolution services
P1.2 ........................................................................................................................................................ 16
A) Discuss the technologies that support network infrastructure management
B) List network type :
P1.3 ........................................................................................................................................................ 18
A) Discuss security resources available in network infrastructure management
Task 2 .......................................................................................................................................... 20
P2.1 ........................................................................................................................................................ 21
P2.2 ........................................................................................................... Error! Bookmark not defined.
P2.3......................................................................................................................................................... 27
Task 3 .......................................................................................................................................... 28
P3.1 ........................................................................................................................................................ 28
Task 4 ....................................................................................................................................................... 29
P4.1 ........................................................................................................................................................ 29
P 4.2........................................................................................................................................................ 30
References ………………………………………………………………………………………………………………………………31
8
Task 1
P1.1
Discuss the benefits and constraints of different networking systems, types and
topologies. Analyse and clearly identify the requirements of the system for this
network in order to convince the management of the given case study company.
I.DNS :
DNS stands for Domain Name Service .When the user enters the URL into the
Web browser, the request is not directly sent to the servers , instead that it goes
to the DNS server which uses a look-up table to determine IP address of the
requested website. Then it forwards the request to the proper servers and returns
the information to the user’s web browser .
*Advantages :
1. Generally DNS is the only system in the entire world that can help you browse
the internet. With the internet becoming an integral part of the society, it has
increasingly become important that DNS Servers remain maintained. Without
them, then the internet would not exist.
2. No need for memorizing IP addresses -DNS servers provide a nifty solution of
converting domain or sub domain names to IP addresses. Imagine how it would
feel having to memorize the IP addresses of twitter, Facebook, Google or any
other site that you normally frequent on a daily basis. It would definitely be
horrific. Its system also makes it easy for search engines to be able to categorize
and archive information.
3. DNS servers have fast internet connections - Use DNS servers can be able to
take advantage of high connection speeds that are a key feature in some of
these servers.
DNS servers also have primary and secondary connections. This allows you to
have internet uptime even when one of the servers is down for maintenance.
*Disadvantages
1. DNS queries usually don’t carry any information about the clients who initiated it.
This is one of the reasons why DNS has been popular among hackers. This is
because the server side will only see the IP address from where the query came
from and which can at times be manipulated by hackers.
2. DNS servers are based on the principle of a slave-master relationship. This
means that if the master server is broken or manipulated in any way, then it will
be hard to access the web page or database that was hosted on the server.
Hackers have also used this to their advantage. By targeting the server machine
and making redirects to other pages, they have been able to find ways of
phishing information.
10
*Definition :
The OSI model (Open System Interconnection) model defines a computer networking
framework to implement protocols in seven layers. A protocol in the networking terms is
a kind of negotiation and rule in between two networking entities.
1.Physical layer :
3.Network Layer :
-Creates logical paths between two hosts across the world wide web called as virtual
circuits
-Different network protocols like TCP/ IP, IPX, AppleTalk work at this layer
4. Transport layer :
5. Session layer :
The session layer sets up, coordinates, and terminates conversations, exchanges, and
dialogues between the applications at each end.
-Protocols like NFS, NetBios names, RPC, SQL work at this layer.
6. Presentation layer :
-Layer 6 Presentation examples include encryption, ASCII, EBCDIC, TIFF, GIF, PICT,
JPEG, MPEG, MIDI.
7. Application Layer :
-Quality of service
-This layer is responsible for application services for file transfers, e-mail, and other
network software services.
*Definition :
TCP/IP specifies how data is exchanged over the internet by providing end-to-end
communications that identify how it should be broken into packets, addressed,
transmitted, routed and received at the destination.
15
TCP/IP is divided into four layers, each of which include specific protocols :
-The application layer provides applications with standardized data exchange. Its
protocols include the Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP),
Post Office Protocol 3 (POP3), Simple Mail Transfer Protocol (SMTP) and Simple
Network Management Protocol (SNMP).
-The network layer, also called the internet layer, deals with packets and connects
independent networks to transport the packets across network boundaries. The network
layer protocols are the IP and the Internet Control Message Protocol (ICMP), which is
used for error reporting.
-The physical layer consists of protocols that operate only on a link -- the network
component that interconnects nodes or hosts in the network. The protocols in this layer
include Ethernet for local area networks (LANs) and the Address Resolution Protocol
(ARP).
16
P1.2
-Ethernet is the most widely installed local area network (LAN) technology. Ethernet is a
link layer protocol in the TCP/IP stack, describing how networked devices can format
data for transmission to other network devices on the same network segment, and how
to put that data out on the network connection. It touches both Layer 1 (the physical
layer) and Layer 2 (the data link layer) on the OSI network protocol model. Ethernet
defines two units of transmission, packet and frame.
The most commonly installed Ethernet systems are called 100 BASE-T (the "BASE-T"
part means the systems use twisted-pair cabling) and provide transmission speeds up to
100 megabits per second (Mbps).
A local area network (LAN) is a group of computers and associated devices that share a
common communications line or wireless link to a server. LAN including computers and
peripherals connected to a server within a distinct geographic area such as an office or a
school. Computers and other mobile devices use a LAN connection to share resources
such as a printer or network storage.
Ethernet and Wi-Fi are the two primary ways to enable LAN connections. Ethernet is a
specification that enables computers to communicate with each other. Wi-Fi uses radio
waves to connect computers to the LAN. Other LAN technologies, including Token Ring,
Fiber Distributed Data Interface and ARCNET, have lost favor as Ethernet and Wi-Fi
speeds have increased. The rise of virtualization has fueled the development of virtual
LANs, which allows network administrators to logically group network nodes and
partition their networks without the need for major infrastructure changes.
Users can order printing and other services as needed through applications run on the
LAN server. A user can share files with others stored on the LAN server; read and write
access is maintained by a network administrator.
18
P1.3
Discuss how protocols enable the effective utilization of different networking systems.
-Physical security :
+Physical barriers :
The outermost layer of network physical security aims to keep people as far
away from your data center property as possible
Using fences, locks, access control cards, biometric access control systems and
fire suppression systems can keep people from getting too close. Consider your
physical security to be almost like a physical “firewall” for your building.
+Use surveillance cameras, motion sensors, security lights and personnel like
security guards and watch dogs.
+The password has at least 8 characters and at least one upper case, one lower
case, one number and one special character.
Data is the most crucial and essential component of every organization, and no
one would want to risk the confidential data to the viruses approaching the
computer system.
Antivirus are recommended for every computer system to keep it secure from
any unknown threats from the internet, external drives, CD/DVDs.
*Advantages :
Antivirus has the primary job of detecting any sought of viruses, spyware,
malware and other unknown threats and removing the same before they can do
any harm to the data present in a computer system.
With the increased use of the internet, various online cyber threats are affecting
the data security of the computer. Antivirus software takes control of the web
activities limiting unauthorized access of any online threat.
20
+Maintains Integrity
Hackers don’t just steal information, they also can benefit from altering data to
commit fraud. While it is possible for highly skilled and technical individuals to
alter encrypted data, recipients of the data will be able to detect the corruption,
allowing for a quick response to the cyber-attack.
+Protects Privacy
Task 2
P2.1
Discuss the role of software and hardware components for the given company case study.
1.UTP cable
Unshielded twisted pair (UTP) is a famous type of copper cabling used in telephone wiring and
local area networks (LANs). UTP cable has two unshielded wires (insulated copper wires) as its
parts, and these are twisted more or less each other in order to reduce the crosstalk or else
electromagnetic field making between the working pairs of insulated wires. There are 4 types of
UTP cables : Cat 3 UTP, Cat 5 UTP, Cat 5e UTP and Cat 6 UTP - each supporting a different
amount of bandwidth. Almost enterprises is prefered UTP cable due to its low cost and ease of
installation.
2. Switch :
A PC or other networked device sends a frame to another device through the switch,
the switch captures the source MAC address of the frame. The initial communication to
a switch is an Address Resolution Protocol (ARP) request. The inbound ARP contains
the sender’s MAC address, and the switch adds that address to its lookup table..
When a switch has learned the locations of the devices connected to it, it ‘s ready to
either forward or filter frames based on the destination MAC address of the frame and
the contents of the switch lookup table.
If the switch has already found the port of device A by its MAC address ff ff ff ff ff ff and
switch port number 2. The switch will receive the incoming frame, examine the
destination address of the Ethernet frame, and check its lookup table. The switch will
then make a decision to forward the frame out port 2, and only port 2.
22
3. Router :
Routing is the process during which data packets are forwarded from one machine or
device (a node) to another on a network until they reach their destinations.
When data is transferred from one device to another on an IP network, the data is
broken down into smaller units called packets. These units carry, along with the data, a
header that contains a lot of information that help them to reach their destination. This
information includes the IP addresses of the source and destination devices, packet
numbers and some other technical information.
These data packets have to cross through a lot of routers to reach their destination .The
work these routers do is called routing. Each of the intermediate routers consults the IP
address of each packet received. Based on this, each will know exactly in which
direction to forward the packet
The packets go through different networks and take different paths. They all finally get
routed to one last destination machine.
On receiver's machine, the destination address and the machine address will match.
The packets will be consumed by the machine, where the IP module on it will
reassemble them and send the resulting data above to the TCP service for further
processing.
23
4.FTP server :
File transfers over the Internet use special techniques, of which one of the oldest and
most widely-used is FTP.
FTP, short for "File Transfer Protocol," can transfer files between any computers that
have an Internet connection, and also works between computers using totally different
operating systems.
Transferring files from a client computer to a server computer is called "uploading" and
transferring from a server to a client is "downloading"..
The FTP server may support Active or Passive connections or both. In an Active FTP
connection, the client opens a port and listens and the server actively connects to it. In
a Passive FTP connection, the server opens a port and listens (passively) and the client
connects to it. We must grant Auto FTP Manager access to the Internet and to choose
the right type of FTP Connection Mode.
24
5.Web server :
Whenever you view a web page on the internet, you are requesting that page from a web
server. When you type a URL into your browser, your browser requests the page from the web
server and the web server sends the page back:
P2.2
Discuss server types and selection requirement for the given company case study.
-HTTP
One of the most commonly used services on the Internet is the World Wide Web
(WWW). The application protocol that makes the web work is Hypertext Transfer
Protocol or HTTP. HTTP is the protocol that web browsers and web servers use to
communicate with each other over the Internet.
1. If the URL contains a domain name, the browser first connects to a domain name
server and retrieves the corresponding IP address for the web server.
2. The web browser connects to the web server and sends an HTTP request for the
desired web page.
3. The web server receives the request and checks for the desired page. If the page
exists, the web server sends it. If the server cannot find the requested page, it
will send an HTTP 404 error message.
4. The web browser receives the page back and the connection is closed.
5. The browser then parses through the page and looks for other page elements it
needs to complete the web page. These usually include images, applets, etc.
6. For each element needed, the browser makes additional connections and HTTP
requests to the server for each element.
7. When the browser has finished loading all images, applets, etc. the page will be
completely loaded in the browser window.
26
-DNS
The Domain Name System is maintained by a distributed database system, which uses
the client–server model. The nodes of this database are the name servers and the top
of the hierarchy is served by the root name servers.
DNS systems allow network clients to convert URLs into IP addresses. This is a key
part of network operation, as computers and other devices need to know each other's IP
address in order to communicate over a network. The client side of the DNS is called a
DNS resolver. A resolver is responsible for translate a domain name into an IP
address. When a network client contacts a resolver, then resolver contacts multiple
authoritative name servers -- the servers that actually hold the IP address information --
in order to get the necessary IP address. DNS requests may involve name servers all
over the world.
FTP
When files are transferred through FTP, one of two actions is happening – uploading or
downloading. Uploading involves transferring files from a personal computer to a server.
Downloading involves transferring a file from a server to a personal computer. FTP uses TCP/IP
(Transmission Control Protocol/Internet Protocol) to transfer your files. TCP/IP is basically the
language that the Internet uses to carry out commands.
The standard FTP protocol is not encrypted, meaning it is vulnerable to packet sniffers and
other types of snooping attacks. Therefore, the FTPS and SFTP protocols were developed to
provide secure FTP connections. FTPS (FTP with SSL security) provides SSL encryption for all
FTP communication. SFTP (SSH File Transfer Protocol) is a secure version of FTP that uses
SSH to encrypt all data transfers.
27
P2.3
Evaluate rights and security requirements for a given networked environment
We will set access control list for the router to give the access permission for the users and
managers.
.
28
Task 3
The objective for this task is to address and exhibit understand networking components
and be able to design a network system for the given case study. You are required to
carry out research by using supportive materials like books, websites, etc., and give a
feedback of the findings on all assessment criteria in task 3. The answers need to be
reflected to the given case study.
P3.1
Design a network system diagram using Packet tracer or any other tools of your choice
for the given case study. In the design you should consider current and future provisions
in terms of user requirements and the network infrastructure itself.
29
Task 4
P4.1
Implement a network systems based on the proposed design. You are required to use
means of simulation software, establish a network according to the design in task 3.
Critically review, why different network standards and protocols are necessary
Standards exist is to make sure that the hardware and software that is made by different
vendors can work together seamlessly. If there were no networking standards, it would
be difficult to create networks that can share information reliably.
Standards also ensure that customers are not limited to using one vendor which means
they can buy hardware and software from any vendor who is equipped to meet their
standards. This keeps the marketplace healthy and can keep prices competitive.
Protocols are a set of rules that are used for the exchange of information. They run in
the background so users are unaware of them but every action you take (whether it’s
clicking on a link or dialing a number on a phone) invokes some sort of protocol.
The communication between devices usually begins by the client computer sending a
signal to a server about information on the type of data being requested. Some
exchanges take place which eventually end when the server has closed the connection.
If there were no protocols or rules, computers wouldn’t be able to talk to each other as
these protocols allow computers to communicate in an organized way without
misinterpretation.
30
P 4.2
Evaluate system and user assurance of the implemented system, test network systems
to meet user requirements. Your testing includes functionality of the network to ensure
that your developed network will operate seamlessly in a physical environment so that it
can satisfy user requirements.
Recommend : Buy redundant switches and routers for the larger-scale of the
network in the future.
31
References
Task 1
P1.1
A) Evaluate current name resolution services
Task 2
P2.1
-SearchNetworking. (2018). What is Unshielded Twisted Pair (UTP)? - Definition
from WhatIs.com. [online] Available at:
https://searchnetworking.techtarget.com/definition/Unshielded-Twisted-Pair
[Accessed 26 Sep. 2018].
-The Connection. (2018). What Is FTP And How Does It Work? - The Connection.
[online] Available at: https://internet.frontier.com/resources/resources/internet-
faqs/ftp/ [Accessed 26 Sep. 2018].